Sciweavers

878 search results - page 156 / 176
» The design and implementation of the redland RDF application...
Sort
View
ICMCS
1999
IEEE
127views Multimedia» more  ICMCS 1999»
14 years 3 days ago
Achievable Performance of Digital Watermarking Systems
A variety of digital watermarking applications have emerged recently that require the design of systems for embedding one signal (the "embedded signal" or "watermar...
Brian Chen, Gregory W. Wornell
ATAL
2006
Springer
13 years 11 months ago
How equitable is rational negotiation?
Notions of fairness have recently received increased attention in the context of resource allocation problems, pushed by diverse applications where not only pure utilitarian effic...
Sylvia Estivie, Yann Chevaleyre, Ulle Endriss, Nic...
EDO
2006
Springer
13 years 11 months ago
Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network
In this paper we present Damon, a decentralized wide-area runtime aspect middleware built on top of a structured peer-topeer (p2p) substrate and a dynamic Aspect Oriented Programm...
Rubén Mondéjar, Pedro García ...
ACSW
2007
13 years 9 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
PEPM
2010
ACM
14 years 4 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson